Industry FocusAWS RDS data security best practicesAugust 24, 202215 Best practices for securing RDS databases on AWS.Mark MichonEngineeringThe ultimate guide to securing data for Rails developersAugust 12, 2022Everything you need to know to secure your Ruby on Rails applications. From database connections to encryption. From a team of seasoned Rails devs.Guillaume MontardTanguy JoannotIndustry FocusData Security Controls: Six Types and How to Implement ThemAugust 11, 2022Here’s an explanation of the six types of data security controls and how you can use them to evaluate your data security.Guest ContributorIndustry FocusData Discovery: A Detailed Guide to the What, Why, and HowAugust 9, 2022Data discovery: what is it, why is it important, and how to get started. This article will take a look at how to manage it.Guest ContributorAnnouncementsDetect risks of data breaches proactively with BearerAugust 4, 2022We're pleased to announce the release of our risk detection feature, which helps your team identify data risks throughout your development cycle.Tanguy JoannotIndustry FocusHow to establish a data security policy that worksAugust 3, 2022Data security outlines the risks and internal strategies your company needs to protect data from internal and external threats.Mark MichonIndustry FocusData Breach Mitigation: 6 Steps You Can TakeAugust 2, 2022The process of data breach mitigation is responding to cybersecurity events to limit their scope and severity. Having the proper plan can minimize damage.Guest ContributorIndustry FocusData Flow Mapping: Why It Matters and How to Do ItJuly 28, 2022A quick overview of what data flow mapping is, why it matters for data handling and compliance, and the basic steps of how to do it.Guest ContributorIndustry FocusAn In-Depth Guide to Conducting a Data Security AuditJuly 26, 2022Let's explore how to conduct a data security audit. We'll talk about the different types of audits and the steps you need to take when conducting an audit.Guest ContributorPrevious2 / 8Next